hacking economic espionage n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Hacking-Economic Espionage PowerPoint Presentation
Download Presentation
Hacking-Economic Espionage

Loading in 2 Seconds...

play fullscreen
1 / 18

Hacking-Economic Espionage - PowerPoint PPT Presentation


  • 132 Views
  • Uploaded on

Hacking-Economic Espionage. Aksana Chornenkaya, Sherin Hassan, & Meagan Moore. Goals of Presentation. Explain how cyber hacking and economic espionage has evolved over the past century Examples of hacker groups Examples of victims of hacking and economic espionage Acts and Regulations

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Hacking-Economic Espionage' - zwi


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
hacking economic espionage

Hacking-Economic Espionage

Aksana Chornenkaya, Sherin Hassan, & Meagan Moore

goals of presentation
Goals of Presentation
  • Explain how cyber hacking and economic espionage has evolved over the past century
    • Examples of hacker groups
    • Examples of victims of hacking and economic espionage
    • Acts and Regulations
    • Prevention
importance
Importance
  • Importance to accounting students and business professionals.
  • Huge threat to companies, domestic and global.
  • Growth of technology and reliance on

information-based systems.

what is a hacker
What is a Hacker?

“A person who finds weaknesses in a computer system and exploits it.”

“Someone involved in the exploration of technology.”

hacker groups
Hacker Groups
  • Warelords
  • Midwest Pirates Guild
  • 414’s
  • Legion of Doom
  • Many more…….
computer fraud abuse a ct
Computer Fraud & Abuse Act
  • Until it was passed, breaking into computer systems was not an illegal or criminal act.
  • Passed by Congress in 1986
  • Hacking IS a CRIME!!!!
operation sundevil
Operation Sundevil
  • Operation Sundevil - 1990
    • Secret Services began raiding and arresting hackers
    • Involved in credit card theft, telephone and wire fraud
evolution of hacking
Evolution of Hacking
  • DOS attacks
  • Viruses
  • Malware - Worms
types of hackers
Types of Hackers
  • Black Hat Hackers – Malicious
  • White Hat Hackers – Ethical hackers
  • Grey Hat Hackers
effects of hacking on a co
Effects of Hacking on a Co.
  • Misappropriation of assets
  • Inventory theft
  • Insider trading
  • Credit card fraud
  • False invoices
  • Revenue misstatement
  • Expense account abuse
importance for accountants
Importance for Accountants
  • Accountants must be aware of the threats
  • Internal auditors must develop processes and controls to prevent hacks
  • Must work with external auditors to identify security controls
  • Advances in technology increased opportunities for fraud
motivation for economic espionage
Motivation for Economic Espionage
  • Fierce competitive pressures
  • Improvements in eavesdropping technology
  • Weakest link: Employees
most publicized cases
Most Publicized Cases
  • Toshiba vs. Lexar
  • Davis vs. Gillette
  • Reuters vs. Bloomberg
economic e spionage a ct
Economic Espionage Act
  • Passed in 1996
  • Failed to curtail the problem
  • Companies were reluctant to seek prosecution
ways to reduce hacking and ee
Ways to Reduce Hacking and EE
  • SOX Section 404
  • Proactive and reactive approach
  • Strong internal auditing department
    • Strong IT controls
    • Physical access controls
    • Employee training
in conclusion
In Conclusion

Companies that implement strong IT controls, physical access controls, nondisclosure agreements and background checks make it harder for hackers or employees to breach systems and acquire proprietary information.